Publications

Preprints / Under Review

  1. M. Egger, R. Bitar, A. Wachter-Zeh and D. Gündüz, Efficient Distributed Machine Learning via Combinatorial Multi-Armed Bandits, preprint, arXiv:2202.08302, 2022.

  2. A. Lenz, R. Bitar, A. Wachter-Zeh and E. Yaakobi, Function-Correcting Codes, submitted to IEEE Transactions on Information Theory, 2022.

  3. S. Kas Hanna, R. Bitar, P. Parag, V. Dasari and S. El Rouayheb, Adaptive Stochastic Gradient Descent for Fast and Communication-Efficient Distributed Learning, preprint, arXiv:2208.03134, 2022.

  4. S. Kas Hanna and R. Bitar, Codes for Detecting Deletions and Insertions in Concatenated Strings, preprint, arXiv:2105.00212, 2021.

  5. R. Bitar and S. Jaggi, Communication Efficient Secret Sharing in the Presence of Malicious Adversary, preprint, arXiv:2002.03374, 2020.

  6. Y. Keshtkarjahromi, R. Bitar, V. Dasari, S. El Rouayheb, and H. Seferoglu, Secure Coded Cooperative Computation at the Heterogeneous Edge against Byzantine Attacks, preprint, arXiv:1908.05385, 2020.

  7. E. Klarlund, R. Bitar and S. El Rouayheb, Search Efficient Blockchain-Based Immutable Logging And Querying, submitted to BMC Medical Genomics, 2018.

Journals

  1. C. Hofmeister, R. Bitar, M. Xhemrishi and A. Wachter-Zeh, Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound, IEEE Journal on Selected Areas in Information Theory (JSAIT), Vol. 3, No. 2, June 2022. (arXiv:2108.05742)

  2. L. Welter, R. Bitar, A. Wachter-Zeh and E. Yaakobi, Multiple Criss-Cross Deletion and Insertion Correcting Codes, IEEE Transactions on Information Theory, Vol. 68, No. 6, June, 2022. (arXiv:2102.02727)

  3. R. Bitar, M. Xhemrishi and A. Wachter-Zeh, Adaptive Private Distributed Matrix Multiplication, IEEE Transactions on Information Theory, Vol. 68, No. 4, April 2022. (arXiv:2004.12925)

  4. S. Li, R. Bitar, S. Jaggi and Y. Zhang, Network Coding with Myopic Adversaries, IEEE Journal on Selected Areas in Information Theory (JSAIT), Vol. 2, No. 4, December 2021. (arXiv:2102.09885)

  5. R. Bitar, L. Welter, I. Smagloy, A. Wachter-Zeh and E. Yaakobi, Criss-Cross Insertion and Deletion Correcting Codes, IEEE Transactions on Information Theory, Vol.67, No.12, December 2021. (arXiv:2004.14740)

  6. R. Bitar, Y. Xing, Y. Keshtkarjahromi, V. Dasari, S. El Rouayheb, and H. Seferoglu, Private and Rateless Adaptive Coded Computation at the Edge, EURASIP Journal on Wireless Communications and Networking, Vol.1, January 2021. (arXiv:1909.12611)

  7. R. Bitar, M. Wootters and S. El Rouayheb, Stochastic Gradient Coding for Straggler Mitigation in Distributed Learning, IEEE Journal on Selected Areas in Information Theory,, Vol.1, No. 1, May 2020. (arXiv:1905.05383)

  8. R. Bitar, P. Parag and S. El Rouayheb, Minimizing Latency for Secure Coded Computing Using Secret Sharing via Staircase Codes, IEEE Transactions on Communication, Vol. 68, No. 8, August 2020. (arXiv:1802.02640)

  9. R. Bitar and S. El Rouayheb, Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads, IEEE Transactions on Information Theory, Vol. 64, No. 2, February 2018. (arXiv:1512.02990)

Conferences

  1. M. Xhemrishi, M. Egger and R. Bitar, Efficient Private Storage of Sparse Machine Learning Data, IEEE Information Theory Workshop (ITW), invited paper, 2022.

  2. N. Raviv, R.Bitar and E. Yaakobi, Information Theoretic Private Inference in Quantized Models, IEEE International Symposium on Information Theory (ISIT), 2022.

  3. E. Stylianou, L. Welter, R. Bitar, A. Wachter-Zeh and E. Yaakobi, Equivalence of Insertion/Deletion Correcting Codes for d-dimensional Arrays, IEEE International Symposium on Information Theory (ISIT), 2022.

  4. M. Egger, R. Bitar, A. Wachter-Zeh and D. Gündüz, Efficient Distributed Machine Learning via Combinatorial Multi-Armed Bandits, IEEE International Symposium on Information Theory (ISIT), 2022.

  5. M. Xhemrishi, R. Bitar and A. Wachter-Zeh, Distributed Matrix-Vector Multiplication with Sparsity and Privacy Guarantees, IEEE International Symposium on Information Theory (ISIT), 2022.

  6. C. Hofmeister, R. Bitar, M. Xhemrishi and A. Wachter-Zeh, Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound, Twelfth International Workshop on Coding and Cryptography (WCC), March 2022.

  7. S. Kas Hanna and R. Bitar, Codes for Detecting Deletions and Insertions in Concatenated Strings, IEEE International Symposium on Information Theory (ISIT), 2021.

  8. A. Lenz, R. Bitar, A. Wachter-Zeh and E. Yaakobi, Function-Correcting Codes, IEEE International Symposium on Information Theory (ISIT), 2021.

  9. L. Welter, R. Bitar, A. Wachter-Zeh and E. Yaakobi, Multiple Criss-Cross Deletion-Correcting Codes, IEEE International Symposium on Information Theory (ISIT), 2021.

  10. S. Li, R. Bitar, S. Jaggi and Y. Zhang, Network Coding with Myopic Adversaries, IEEE International Symposium on Information Theory (ISIT), 2021.

  11. R. Bitar, S. Kas Hanna, N. Polyanskii and I. Vorobyev, Optimal Codes Correcting Localized Deletions, IEEE International Symposium on Information Theory (ISIT), 2021.

  12. R. Bitar, M. Xhemrishi and A. Wachter-Zeh, Fountain Codes for Private Distributed Matrix-Matrix Multiplication, IEEE International Symposium on Information Theory and its Applications (ISITA), 2020.

  13. R. Bitar and S. Jaggi, Communication Efficient Secret Sharing in the Presence of Malicious Adversary, IEEE International Symposium on Information Theory (ISIT), 2020.

  14. S. Kas Hanna, R. Bitar, P. Parag, V. Dasari and S. El Rouayheb, Adaptive Distributed Stochastic Gradient Descent for Minimizing Delay in the Presence of Stragglers, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Barcelona, 2020.

  15. R. Bitar, I. Smagloy, L. Welter, A. Wachter-Zeh and E. Yaakobi, Criss-Cross Deletion Correcting Codes, IEEE International Symposium on Information Theory and its Applications (ISITA), 2020.

  16. Y. Keshtkarjahromi, R. Bitar, V. Dasari, S. El Rouayheb, and H. Seferoglu, Secure Coded Cooperative Computation at the Heterogeneous Edge against Byzantine Attacks, IEEE Global Communication Conference (GLOBECOM), Waikoloa, 2019

  17. R. Bitar, M. Wootters and S. El Rouayheb, Stochastic Gradient Coding for Straggler Mitigation in Distributed Learning, IEEE Information Theory Workshop (ITW), 2019.

  18. R. Bitar, Y. Xing, Y. Keshtkarjahromi, V. Dasari, S. El Rouayheb, and H. Seferoglu, PRAC: Private and Rateless Adaptive Coded Computation at the Edge, SPIE Defense + Commercial Sensing, Baltimore, 2019.

  19. R. Bitar and S. El Rouayheb, Staircase-PIR: Universally Robust Private Information Retrieval, IEEE Information Theory Workshop (ITW), Guangzhou, 2018.

  20. R. Bitar, P. Parag and S. El Rouayheb, Minimizing Latency for Secure Distributed Computing, IEEE International Symposium on Information Theory (ISIT), Aachen, 2017.

  21. R. Bitar and S. El Rouayheb, Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads, IEEE International Symposium on Information Theory (ISIT), Barcelona, 2016.

  22. R. Bitar and S. El Rouayheb, Securing data against Limited-Knowledge Adversaries in Distributed Storage Systems, IEEE International Symposium on Information Theory (ISIT), Hong Kong, 2015.

PhD Thesis